Free

Computer Forensics Assignment 2 - Essay Example

Comments (0) Cite this document
Summary
Those include hardware and software to conduct the investigations and data storage. Remarkably, it is imperative to ensure the lab is safe and…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.1% of users find it useful
Computer Forensics Assignment 2
Read TextPreview

Extract of sample "Computer Forensics Assignment 2"

Computer Forensics Assignment 2 Computer Forensics Assignment 2 Equipment and Software to Purchase A computer forensics lab shouldhave fundamental requirements for conducting investigation and ensuring safe storage of evidence. Those include hardware and software to conduct the investigations and data storage. Remarkably, it is imperative to ensure the lab is safe and productive. To ensure security, the following equipment’s should exist. There should be a safe to serve as a secure container. An example of a secure safe is a heavy-duty cabinet. It should be under regular lock and only accessible to authorized staff serving at the lab. It is necessary to purchase equipment that are necessary to set up a TEMPEST-qualified lab. That demands setting up evidence storage container or lockers. Such lockers ensure security of evidence stored and restricted access by authorized staff. Locks installed should be of high quality and have limited possibilities of distribution of duplicate-keys.
Source: EC-Council (2009)
Evidence storages should be subject to regular inspections to ensure only current evidence are kept therein and closed cases’ evidence are relocated to secure locations in an off-site facility. The evidence container should be in a position restricted to authorized staff members and the number of people granted access should be minimum. Furthermore, only authorized staff members should inspect lock combinations. In case the investigations use intel-based PCs, computers are necessary. There is need to acquire the right Operating Systems (OS) and other applications. Computer forensics software package should form part of the software acquired (Nelson, Phillips & Steuart, 2009). Specialized software are similarly important. They include software such as Peachtree. Disk-editing software are also necessary for evidence analysis (Nelson, Phillips & Steuart, 2009).
Source: EC-Council (2009)
Documenting the crime scene and collect and package the evidence
Computers may contain incriminating evidence including DNA but professional curiosity has a potential to destroy evidence. It is, therefore, imperative to properly document, collect and package the evidence from a crime scene. The U.S DOJ standards for seizing digital evidence are applicable (The Office of Legal Education, 2011). In the case of a drug dealer’s computer, the following process should be applicable. The investigator should seize the computer together with other peripherals found at the scene. Peripherals include cell phones, scanners and cameras. Printers CDs, DVDs and USB devices should also be seized.
Source: Department of Justice (2008)
Source: Department of Justice (2008)
After that, the investigators should recognize information that can serve as evidence from the scene of crime. The next stage is to document the evidence collected from the scene. Collect the computer document that exists in the storage devices. E-mails, texts and internet histories form a great part of the information that should be collected during the investigations (NFSTC, 2010). Online-based backup systems are valuable sources of information that are important during investigations (Taylor et al., 2010). The DSL connection should, as well, be documented during the time of evidence collection. In an attempt to avoid alteration of data, it is imperative to document all activities that were occurring in the computer at the time of collecting evidence. Photographs of the computer should be taken to show the state it was found at the time of evidence collection. All evidence collected from the scene should be in safe custody and handled by professionals.
References
EC-Council (2009). Computer Forensics: Investigation Procedures and Response. Clifton Park, NY: Cengage Learning.
National Forensic Science Technology Center (NFSTC). (2010). A Simplified Guide to Digital Evidence. Retrieved May 25, 2015 from http://www.crime-scene-investigator.net/SimplifiedGuideDigitalEvidence.pdf
Nelson, B., Phillips, A., & Steuart, C. (2009). Guide to computer forensics and investigations. Cengage Learning.
Taylor, M., Haggerty, J., Gresty, D., & Hegarty, R. (2010). Digital evidence in cloud computing systems. Computer Law & Security Review, 26(3), 304-308.
The Office of Legal Education (2011). Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations. Retrieved May 25, 2015 from http://www.justice.gov/criminal/cybercrime/docs/ssmanual2009.pdf
U.S. Department of Justice. (2008, April). Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition. On Demand Publishing, LLC-Create Space. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Forensics Assignment 2 Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Computer Forensics Assignment 2 Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1695924-computer-forensics-assignment-2
(Computer Forensics Assignment 2 Essay Example | Topics and Well Written Essays - 500 Words)
Computer Forensics Assignment 2 Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1695924-computer-forensics-assignment-2.
“Computer Forensics Assignment 2 Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1695924-computer-forensics-assignment-2.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Computer Forensics Assignment 2

Computer Architecture

...of general purpose computers, and therefore made it easy for subsequent developments to be made (Aspray, 1990). Question 2 As one of the two main buses in a computer, the system bus plays a crucial role in ensuring that a computer functions normally and commands are executed as required. The system bus is a network formed by the linking of the different sections in a computer; these are the system memory, the CPU and other components that are located on the motherboard. The main function of the system bus is to enhance modularity and reduce production costs all at the same time (Appleman, 2000). For example, earlier computers were bulky...
4 Pages(1000 words)Assignment

The Human-Computer Interface

...for the acquisition of the psychomotor skills. 2. Compare the various types of human memory and their impact on the human-computer interface There are various types of the human memory, and human have limited capability to process the information. This information is stored in the different types of memory. Short term or working memory: The short term memory is the capacity and store situated in the frontal lobes. Its function is to manipulate and update the representation, dividing and switching towards the tasks, and selection for the appropriate information. The retention time of the information in the short term memory is from seconds to minutes. Sensory Memory: It corresponds to the perception of an...
4 Pages(1000 words)Assignment

Computer Methods

...Manchester Metropolitan Department of Computing and Mathematics MA1261 Computing Methods: Test Revision P, Q and R are the sets P = {1, 2, 3, 4}, Q = {3, 4, 5, 6} and R = {3, 5, 7, 9}. a) Draw the Venn diagram containing P, Q and R. [4] b) List the elements in the sets P - (Q'R) and (P - Q)'(P - R). Are these two sets equal' Justify your answer. [6] c) List the elements in T = X ''Y when X = P - Q and Y = P - R. Assuming T is the universal set and S = {(x, y), x
5 Pages(1250 words)Assignment

Computer

...Who is Bill Gates Bill Gates was born in Seattle on 28th October 1955. He is a son of an attorney who also teaches in a school. In the age of 17, Bill Gates sold out his first computer program that was a timetable system to a school for worth $ 4200. While studying in Harvard, he wrote the first computer language program along with Paul Allen, who was his friend. Both of them founded Microsoft in 1975, and after one year, Gates left out Harvard to run Microsoft and in 1986, the organization was storming upwards with a $ 61 million turnover (Jones 2006). Bill Gates, who is considered the architect of Microsoft, stands in the top twenty richest people in the world with assets of over $ 56 Billion (THE TOP...
4 Pages(1000 words)Assignment

Computer

.... Essay 2: Reflection on the Technology The analysis is clear enough as it addresses the concept of Bad Design essay. It begins from looking at how the issue of technology was implemented on the picture. The fact that the device can light up by just pressing a button clearly implies that technology was used in making it. In order to come up with a good design in a mechanical device requires a lot of research and involvement of technology. The fact that the device contains arrows that direct the user on what to do clearly implies that the technology was used to make the device be able to communicate to the user. Therefore, the concept of technology was well employed on the device (Ursula 2007). The analysis also talks about...
4 Pages(1000 words)Assignment

Computer security

... College: Computer Security What is the basic purpose behind the CVE? The main purpose of the Common Vulnerabilities and Exposures site is to provide a platform that provides synchronized information on all vulnerabilities in the information security sector. Its goal is to make it easy to share information on these vulnerability capabilities. This would involve giving common names to problems in the public domain including vulnerability repositories, tools, and services. Describe the convention used for the identifiers of the CVE reports found on the site. Identifiers for CVE reports are unique identities that are allocated to publicly known vulnerabilities to information security. Each identifier, therefore, represents a single... College:...
1 Pages(250 words)Assignment

Computer Security

...Computer sciences and Information technology 18 august, COMPUTER SECURITY “Flame” virus is developed by the joint efforts of United States and the Israel. Its preparation took intelligence for cyber-sabotage which was actually focused at slowing the ability of Iran to develop a nuclear weapon. Iran’s computer networks were secretly mapped and observed by the massive piece of malware, sending back a stable stream of intelligence to prepare for a campaign of a cyber-warfare. Flame is a bug which is one of the most powerful cyber. Flame and Stuxnet are the viruses that have been found recently. Many people do not even know that flame, stuxnet, etc. are the computer viruses....
1 Pages(250 words)Assignment

Computer Security

...Computer Security Kerberos Computer Network Authentication Protocol Kerberos serves as a network authentication protocol that allows for mutual identification, in which case the computer server and the user identify one another in the course of operation. The authentication situation involves three different parties; the user, the resources sourced for and the Key Distribution Centre (KDC) (Nagamalai, Renault and Dhanuskodi 496). Kerberos uses the KDC for authentication. The user logs in, and the principal sent to KDC server for login. The KDC server, in return, provides Ticket-Granting Tickets (TGT). The KDC server searches the principal name in the database and generates a TGT...
1 Pages(250 words)Assignment

Cybercrime Investigation and Digital Forensics

...insight of various activities that are prevailing on their networks in real time so that they could act swiftly in identifying and preventing threats of data breach thereby building a reliable, cost effectual, and secure healthcare organization. References Dowler, M. (2008, December 23). Beginners guides: cloning WindowsXP. Retrieved from: http://www.pcstats.com/articleview.cfm?articleid=418&page=7 Gurjar, C. (2014). Computer forensics investigation – a case study. Retrieved from: http://resources.infosecinstitute.com/computer-forensics-investigation- case-study/ “Investigating a data breach – IT forensic services.” (n. d). In EY. Retrieved ...
7 Pages(1750 words)Assignment

Digital Evidence: Understanding The Process and Challenges

... Digital Evidence: Understanding the Process and Challenges Table of Contents 1. Introduction---------------------------------------------------------------- 22. Computer Forensics and Digital Evidence i) Computer Forensics ------------------------------------------2 ii) What is Evidence? ---------------------------------------------3 Digital Evidence-------------------------------------3 Inculpatory and Exculpatory Evidence---------4 iii) Computer Forensic Methodologies Kruse and Heiser Model: 3 A’s Model----------4 KPMG Model------------------------------------------4 Dittrich and Brezinski Model-----------------------5 Yale University Model-------------------------------5 iv) Lifecycle of Computer Forensic Crimes Initial... that...
13 Pages(3250 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Computer Forensics Assignment 2 for FREE!

Contact Us